
This commit updates kernel to 5.10.189 to fix following CVE issue: CVE-2023-4132: https://nvd.nist.gov/vuln/detail/CVE-2023-4132 CVE-2023-4004: https://nvd.nist.gov/vuln/detail/CVE-2023-4004 CVE-2023-20593: https://nvd.nist.gov/vuln/detail/CVE-2023-20593 CVE-2023-3863: https://nvd.nist.gov/vuln/detail/CVE-2023-3863 CVE-2023-31248: https://nvd.nist.gov/vuln/detail/CVE-2023-31248 CVE-2023-35001: https://nvd.nist.gov/vuln/detail/CVE-2023-35001 CVE-2023-3117: https://nvd.nist.gov/vuln/detail/CVE-2023-3117 CVE-2023-3611: https://nvd.nist.gov/vuln/detail/CVE-2023-3611 CVE-2023-3610: https://nvd.nist.gov/vuln/detail/CVE-2023-3610 CVE-2023-3776: https://nvd.nist.gov/vuln/detail/CVE-2023-3776 CVE-2023-3390: https://nvd.nist.gov/vuln/detail/CVE-2023-3390 CVE-2023-2898: https://nvd.nist.gov/vuln/detail/CVE-2023-2898 One of our source patches requires refresh against the new kernel source. It was modified for missed parameter need be added in the new kernel: Port-negative-dentries-limit-feature-from-3.10.patch. After upgrading kernel, new function eth_hw_addr_set was added in linux-headers-5.10.0-6-common. While it has already defined in the following driver modules: i40e,i40e-cvl-4.10,iavf,iavf-cvl-4.10,ice,ice-cvl-4.10. To avoid the redefinition conflict, we allow the out-of-tree drivers to use the newly added in-tree version of the eth_hw_addr_set function. This is achieved by undefining the NEED_ETH_HW_ADDR_SET macro. Verification: - Build kernel and out of tree modules success for rt and std. - Build iso success for rt and std. - Install success onto a AIO-DX lab with rt kernel. - Boot up successfully in the lab. - The sanity testing was done by our test team and no regression defect was found. - The cyclictest benchmark was also run on the starlingx lab, the result is "samples: 259199999 avg: 1633 max: 8817 99.9999th percentile: 7612 overflows: 0", It is not big difference with 5.10.185 for avg and max. Closes-Bug: 2029211 Change-Id: I107a0c0285ad2de39d56863cc5fed6273ad7fbd4 Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
30 lines
1.4 KiB
Plaintext
30 lines
1.4 KiB
Plaintext
0001-kernel-std-Remove-the-old-changelog-file.patch
|
|
0002-kernel-std-Add-a-new-changelog-file-for-linux-yocto-.patch
|
|
0003-kernel-std-Add-a-kernel-config-file-for-stx-debian.patch
|
|
0004-kernel-std-Adapt-the-debian-folder-for-new-source.patch
|
|
0005-kernel-modules-sign-kernel-modules.patch
|
|
0006-Debian-align-config-file-with-stx-centos.patch
|
|
0007-Debian-update-5.10-Kernel-to-5.10.99.patch
|
|
0008-config-set-configs-needed-for-secure-boot.patch
|
|
0009-Drop-Android-patches.patch
|
|
0010-Debian-Disable-CONFIG_BNXT.patch
|
|
0011-Debian-Hardcode-net.naming-scheme-in-CONFIG_CMDLINE.patch
|
|
0012-Debian-update-5.10-Kernel-to-5.10.112.patch
|
|
0013-kernel-std-fix-proc-version-content.patch
|
|
0014-kernel-std-clean-patches-from-debian-release.patch
|
|
0015-Debian-Added-apparmor-security-module.patch
|
|
0016-debian-rules.real-Parallelize-xz-compression.patch
|
|
0017-Debian-Enable-WireGuard-config.patch
|
|
0018-Place-module-signing-keys-in-a-separate-packa.patch
|
|
0019-Upgrade-5.10-kernel-to-5.10.152.patch
|
|
0020-kernel-std-unset-LOCK_DOWN_IN_EFI_SECURE_BOOT.patch
|
|
0021-config-don-t-unset-CONFIG_EFIVAR_FS.patch
|
|
0022-Upgrade-5.10-kernel-to-5.10.162.patch
|
|
0023-Fix-badly-formatted-trailer-line.patch
|
|
0024-Upgrade-5.10-kernel-to-5.10.177.patch
|
|
0025-Disable-unprivileged-eBPF-by-default.patch
|
|
0026-Upgrade-5.10-kernel-to-5.10.180.patch
|
|
0027-config-Enable-Intel-RAPL-and-uncore-frequency-contro.patch
|
|
0028-Upgrade-5.10-kernel-to-5.10.185.patch
|
|
0029-Upgrade-5.10-kernel-to-5.10.189.patch
|